{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:44Z","timestamp":1750220444550,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,1,28]]},"DOI":"10.1145\/3448734.3450783","type":"proceedings-article","created":{"date-parts":[[2021,5,17]],"date-time":"2021-05-17T15:47:36Z","timestamp":1621266456000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Multi-dimensional Resource Management System Based on Blockchain and Cybertwin"],"prefix":"10.1145","author":[{"given":"Zhiwei","family":"Chen","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China"}]},{"given":"Wenjing","family":"Hou","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China"}]},{"given":"Hong","family":"Wen","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China"}]},{"given":"Wenxin","family":"Lei","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China"}]},{"given":"Sihui","family":"Wu","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China"}]},{"given":"Haojie","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China"}]}],"member":"320","published-online":{"date-parts":[[2021,5,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958662"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900184"},{"key":"e_1_3_2_1_3_1","volume-title":"A Cybertwin based Network Architecture for 6G[C]\/\/2020 2nd 6G Wireless Summit (6G SUMMIT)","author":"Yu Q","year":"2020","unstructured":"Yu Q , Ren J , Zhou H , A Cybertwin based Network Architecture for 6G[C]\/\/2020 2nd 6G Wireless Summit (6G SUMMIT) . IEEE , 2020 : 1-5.. Yu Q, Ren J, Zhou H, A Cybertwin based Network Architecture for 6G[C]\/\/2020 2nd 6G Wireless Summit (6G SUMMIT). IEEE, 2020: 1-5.."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.1081060"},{"key":"e_1_3_2_1_5_1","first-page":"1","article-title":"Optimal auction for edge computing resource management in mobile blockchain networks: A deep learning approach[C]\/\/2018 IEEE International Conference on Communications (ICC)","volume":"2018","author":"Luong N C","unstructured":"Luong N C , Xiong Z , Wang P , Optimal auction for edge computing resource management in mobile blockchain networks: A deep learning approach[C]\/\/2018 IEEE International Conference on Communications (ICC) . IEEE , 2018 : 1 - 6 .. Luong N C, Xiong Z, Wang P, Optimal auction for edge computing resource management in mobile blockchain networks: A deep learning approach[C]\/\/2018 IEEE International Conference on Communications (ICC). IEEE, 2018: 1-6..","journal-title":"IEEE"},{"key":"e_1_3_2_1_6_1","unstructured":"Gupta S S. Blockchain[M]. John Wiley & Sons Inc 2017..  Gupta S S. Blockchain[M]. John Wiley & Sons Inc 2017.."},{"key":"e_1_3_2_1_7_1","volume-title":"BCEdge: Blockchain\u2010based resource management in D2D\u2010assisted mobile edge computing[J]","author":"Zhou A","year":"2019","unstructured":"Zhou A , Sun Q , Li J. BCEdge: Blockchain\u2010based resource management in D2D\u2010assisted mobile edge computing[J] . Software : Practice and Experience , 2019 . Zhou A, Sun Q, Li J. BCEdge: Blockchain\u2010based resource management in D2D\u2010assisted mobile edge computing[J]. Software: Practice and Experience, 2019."},{"key":"e_1_3_2_1_8_1","volume-title":"2018 IEEE Conference on Communications and Network Security","author":"Liufei Chen","year":"2018","unstructured":"Liufei Chen , Yushan Li, Hong Wen , Wenxin Lei, Wenjing Hou , Jie Chen, Block Chain Based Secure Scheme For Mobile Communication , 2018 IEEE Conference on Communications and Network Security , Beijing, China, May 30 - June 1, 2018 . Liufei Chen, Yushan Li, Hong Wen, Wenxin Lei, Wenjing Hou, Jie Chen, Block Chain Based Secure Scheme For Mobile Communication,2018 IEEE Conference on Communications and Network Security, Beijing, China, May 30 - June 1, 2018."},{"volume-title":"ISAI2020","author":"Zhiwei Chen","key":"e_1_3_2_1_9_1","unstructured":"Zhiwei Chen , Aidong Xu, Hong Wen , Yunan Zhang and Xinchen Xu, Aviation Terminal Data Security Architecture based on Blockchain , ISAI2020 . Zhiwei Chen, Aidong Xu, Hong Wen, Yunan Zhang and Xinchen Xu, Aviation Terminal Data Security Architecture based on Blockchain, ISAI2020."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00870-9"},{"volume-title":"ICNISC2020","author":"Wenxin Lei","key":"e_1_3_2_1_11_1","unstructured":"Wenxin Lei , Aidong Xu, Haojie Lin , Wenjing Hou, Yunan Zhang , Yixin Jiang, Zhongqi Mao and Hong Wen. On-line Detection of Malicious Activities Based on Edge Computing in Micro-grid System , ICNISC2020 . Wenxin Lei, Aidong Xu, Haojie Lin, Wenjing Hou, Yunan Zhang, Yixin Jiang, Zhongqi Mao and Hong Wen. On-line Detection of Malicious Activities Based on Edge Computing in Micro-grid System, ICNISC2020."}],"event":{"name":"CONF-CDS 2021: The 2nd International Conference on Computing and Data Science","acronym":"CONF-CDS 2021","location":"Stanford CA USA"},"container-title":["The 2nd International Conference on Computing and Data Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448734.3450783","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448734.3450783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:38Z","timestamp":1750193258000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448734.3450783"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,28]]},"references-count":11,"alternative-id":["10.1145\/3448734.3450783","10.1145\/3448734"],"URL":"https:\/\/doi.org\/10.1145\/3448734.3450783","relation":{},"subject":[],"published":{"date-parts":[[2021,1,28]]},"assertion":[{"value":"2021-05-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}